A novel intrusion detection method based on OCSVM and K-means recursive clustering
In: EAI endorsed transactions on security and safety, Band 2, Heft 3, S. e5
ISSN: 2032-9393
14 Ergebnisse
Sortierung:
In: EAI endorsed transactions on security and safety, Band 2, Heft 3, S. e5
ISSN: 2032-9393
In: IEEE transactions on engineering management: EM ; a publication of the IEEE Engineering Management Society, Band 67, Heft 4, S. 1285-1297
In: EAI endorsed transactions on security and safety, Band 4, Heft 13, S. 153524
ISSN: 2032-9393
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 10, Heft 2, S. 64-81
ISSN: 1947-3443
Over-the-air (OTA) update is a method for vehicle manufacturers to remotely distribute maintenance updates, performance, and feature enhancements through the vehicle's lifespan. Recalls of vehicles cost the manufactures a lot of money. OTA solves the recall issue, while allowing consumers to pay for services and features via an update. The OTA ecosystem includes the coders who first developed the firmware, the 1st Tier suppliers, the vehicle manufacturers, and the vehicle itself. Currently, manufacturers designed the networks for speed and responsiveness, and not security. This article examines these elements and drills into the security available for each. The slowest and one of the most vulnerable parts of the system is the communications within the vehicle. The vehicle networks must ensure the integrity and authenticity of messages transmitted to guarantee software programmed onto ECUs are authorized and tamper-free. Specialist hardware within the vehicle makes this possible in an operation environment, such as hardware security modules.
In: Government information quarterly: an international journal of policies, resources, services and practices, Band 36, Heft 2, S. 276-293
ISSN: 0740-624X
In: EAI endorsed transactions on security and safety, S. 166283
ISSN: 2032-9393
In: EAI endorsed transactions on security and safety, Band 4, Heft 14, S. 154769
ISSN: 2032-9393
In: International journal of critical infrastructures: IJCIS, Band 13, Heft 2/3, S. 113
ISSN: 1741-8038
In: International journal of critical infrastructures: IJCIS, Band 13, Heft 2/3, S. 113
ISSN: 1741-8038
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 7, Heft 2, S. 1-15
ISSN: 1947-3443
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for investment budgets, but without an understanding of the nature of the threat, cyber security may not be a high priority. Education and awareness campaigns are established methods of raising the profile of security issues with stakeholders, but traditional techniques typically deliver generic messages to wide audiences, rather than tailoring the communications to those who understand the impact of organisational risks. This paper explores the use of experiential learning through serious games for senior executives, to develop mental models within which participants can frame the nature of the threat, thereby raising their cyber security awareness, and increasing their motivation to address the issue.
In: EAI endorsed transactions on security and safety, Band 3, Heft 7, S. 151727
ISSN: 2032-9393
In: EAI endorsed transactions on security and safety, Band 5, Heft 16, S. 155856
ISSN: 2032-9393
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 4, Heft 2, S. 1-22
ISSN: 1947-3443
Cyber-threats are one of the most significant problems faced by modern Industrial Control Systems (ICS), such as SCADA (Supervisory Control and Data Acquisition) systems, as the vulnerabilities of ICS technology become serious threats that can ultimately compromise human lives. This situation demands a domain-specific approach to cyber threat detection within ICS, which is one of the most important contributions of the CockpitCI FP7 project (http://CockpitCI.eu). Specifically, this paper will present the CockpitCI distributed Intrusion Detection System (IDS) for ICS, which provides its core cyber-detection and analysis capabilities, also including a description of its components, in terms of role, operation, integration, and remote management. Moreover, it will also introduce and describe new domain-specific solutions for ICS security such as the SCADA Honeypot and the Shadow Security Unit, which are part of the CockcpitCI IDS framework.